Appliance for large-scale surveillance environments
Pivot3 announced the expansion of its vSTAC Watch product line with the introduction of the vSTAC Watch Enterprise, an enterprise-class Serverless Computing solution that …
AuthenTec combines fingerprint security with Symantec VIP
AuthenTec’s Eikon Digital Privacy Manager now comes pre-configured with Symantec Validation and ID Protection Service (VIP). The addition of Symantec VIP to Eikon …
Next Level Security Systems releases mobile apps
Next Level Security Systems released the NLSS Gateway 2.3, a new version of the NLSS Gateway that includes the power of a customized management tool, and NextMobile, a mobile …
Cisco and Lumos Networks prepare fiber infrastructure for 100G network
Lumos Networks, a fiber-based service provider, has successfully completed a technology test of Cisco’s 100G coherent DWDM solution across its service area. This …
How much does a 0-day vulnerability cost?
The market for exploits for zero-day vulnerabilities has exploded in the last year, says Adriel Desautels, the founder of Netragard, a penetration testing and vulnerability …
Fake eBay identity confirmation message hitting inboxes
Ebay users are once again targeted with fake notifications asking them to “confirm their identity”. “Dear eBay Community Member, You’re signing in from …
Facebook users targeted with account-hijacking Chrome extensions
With the steady rise in popularity of both Facebook and Google’s Chrome browser, cyber scammers have turned to targeting users of both. According to Kaspersky Lab expert …
Open source audit plug-in for MySQL
McAfee announced a free open source audit plug-in for MySQL database users to capture complete detailed activity audits from their databases. The plug-in was created and …
New cloud disaster recovery service
EVault announced a four-hour option for its Cloud Disaster Recovery Service (EVault CDR) with a guaranteed SLA. The EVault CDR four-hour managed service includes an SLA-backed …
Exploiting legitimate online technology
Criminals intent on distributing images of children being sexually abused are finding new ways of exploiting legitimate online technology, according to the Internet Watch …
Data center industry dynamics
While interest around data center services (DCS) is extremely high, the market structure, dynamics and maturity differ across the world, according to Gartner. The shift toward …
Microsoft disrupts massive cybercrime operation
In its most complex effort to disrupt botnets to date, Microsoft, in collaboration with the financial services industry — including the Financial Services – Information …